Home            Contact us            FAQs
    
      Journal Home      |      Aim & Scope     |     Author(s) Information      |      Editorial Board      |      MSP Download Statistics

     Research Journal of Applied Sciences, Engineering and Technology


An Efficient Scheme to Prevent DDoS Flooding Attacks in Mobile Ad-Hoc Network (MANET)

Meghna Chhabra and B.B. Gupta
School of Computing Science and Engineering, Galgotias Universiy, Greater Noida, India
Research Journal of Applied Sciences, Engineering and Technology  2014  10:2033-2039
http://dx.doi.org/10.19026/rjaset.7.496  |  © The Author(s) 2014
Received: June 25, 2013  |  Accepted: July 19, 2013  |  Published: March 15, 2014

Abstract

The purpose of this study is to understand the flaws of existing solutions to combat the DDoS attack and a novel scheme is being provided with its validation to reduce the effect of DDoS attack in MANET Environment. As Internet users are increasing day by day, it is becoming more prone to attacks and new hacking techniques. People are accessing information and communicating with each other on the move. Mobile Ad-hoc Network (MANET) is responsible for this rapid change in the lives of people. With the emergence of technology, where people communicate or share important documentations on the go with the help of laptops, PDAs, notebooks, smart phones etc., the loopholes in the Internet security have also increased and they are becoming more difficult to handle due to the characteristics of MANET such as dynamic topologies, low battery life, multicast routing, frequency of updates or network overhead, scalability, mobile agent based routing and power aware routing, etc. The network is becoming more prone to attacks like DDoS, byzantine, resource consumption, blackhole, grayhole, etc. Therefore, there is an urgent need to look into the security issues to allow authorized users to access the information available on Internet without any risk. In this study, a novel scheme is proposed which deals with suppressing the influence of the attack. The effectiveness of the approach is validated with simulation in GloMoSim, integrated with parsec compiler, on a windows platform.

Keywords:

ARPANET, DDoS attacks, flooding attack, GloMoSim, MANET,


References

  1. Alomari, E., M. Selvakumar, B.B. Gupta, K. Shankar and A. Rafeef, 2012. Article: Botnet-based Distributed Denial of Service (DDoS) attacks on web servers: Classification and art. Int. J. Comput. Appl., 49(7): 24-32.
  2. CERT, 2007a. Statistics. (Accessed on: May 28, 2007).
    Direct Link
  3. CERT, 2007b. Denial of Service Attacks, Oct. 1997, (Accessed on: May 28, 2007).
    Direct Link
  4. Chaba, Y., Y. Singh and P. Aneja, 2009. Performance Analysis of disable IP broadcast technique for prevention of flooding-based DDoS attack in MANET. J. Networks, 4(3): 178-183.
    CrossRef    
  5. Chhabra, M., B.B. Gupta and A. Almomani, 2013. A novel solution to handle DDoS attack in MANET. Int. J. Inf. Secur., 4(3): 165-179.
    CrossRef    
  6. Douligeris, C. and A. Mitrokotsa, 2004. DDoS attacks and defense mechanisms: Classification and state-of-the-art. Elsevier Sci. Direct Comput. Networks, 44: 643-666.
    CrossRef    
  7. Elnoubi, S., W. Abdallah and M.M.M. Omar, 2011. Minimum bit error rate beam forming combined with space-time block coding using double antenna array group. Int. J. Comput. Sci. Inform. Secur., 9(5).
  8. Gupta, B.B., M. Misra and R.C. Joshi, 2008. An ISP level solution to combat DDoS attacks using combined statistical based approach. J. Inform. Assurance Secur., 2: 102-110.
  9. Gupta, B.B., R.C. Joshi and M. Misra, 2009. Defending against distributed denial of service attacks: Issues and challenges. Inform. Secur. J. Global Perspective, 18(5): 224-247.
    CrossRef    
  10. Houle, K.J., G.M. Weaver, N. Long and R. Thomas, 2001. Trends in denial of service attack technology. Technical Report Version 1.0, CERT Coordination Center, Carnegie Mellon University 2001. (Accessed on: May 28, 2007).
    Direct Link
  11. Ihsan, Z., M. Yazid Idris, K. Hussain, D. Stiawan and K.M. Awan, 2011. Protocol share based traffic rate analysis for UDP bandwidth attack. Comm. Com. Inf. Sc., 251: 275-289.
    CrossRef    
  12. Kavisankar, L. and C. Chellappan, 2011. CNoA: Challenging number approach for uncovering TCP SYN flooding using SYN spoofing attack. Int. J. Network Secur. Appl., 3(5).
  13. Lau, F., S.H. Rubin, M.H. Smith and L. Trajkovi, 2000. Distributed denial of service Attacks. Proceedings of IEEE International Conference on Systems, Man and Cybernetics. Nashville, TN, USA, pp: 2275-2280.
    CrossRef    
  14. Leiner, B.M., V.G. Cerf, D.D. Clark, R.E. Kahn, L. Kleinrock, D.C. Lynch, J. Postel, L.G. Roberts and S. Wolff, 2007. Internet Society: Histories of the Internet-a Brief History of the Internet. Version 3.32. (Accessed on: May 28, 2007).
    Direct Link
  15. Mirkovic, J., J. Martin and P. Reiher, 2004. A taxonomy of DDoS attack and DDoS defense mechanisms. ACM SIGCOMM Comput. Commun. Rev., 34(2): 39-53.
    CrossRef    
  16. Saraeian, S., A. Fazllolah, G.Z. Mohammad and A.A. Seyed, 2008. Performance Evaluation of AODV Protocol under DDoS Attacks in MANET. Proceeding of World Academy of Science, Engineering and Technology, 45: 501.
  17. Schuba, C.L., I.V. Krsul, M.G. Kuhn, E.H. Spafford, A. Sundaram and D. Zamboni, 1997. Analysis of a denial of service attack on TCP. Proceeding of the IEEE Symposium on Security and Privacy, pp: 208-223.
    CrossRef    
  18. Wang, H., D. Zhang and K.G. Shin, 2002. Detecting SYN flooding attacks. Proceeding of the 21th Annual Joint Conference of the IEEE Computer and Communications Societies, (INFOCOM), 3: 1530-1539.

Competing interests

The authors have no competing interests.

Open Access Policy

This article is distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.

Copyright

The authors have no competing interests.

ISSN (Online):  2040-7467
ISSN (Print):   2040-7459
Submit Manuscript
   Information
   Sales & Services
Home   |  Contact us   |  About us   |  Privacy Policy
Copyright © 2024. MAXWELL Scientific Publication Corp., All rights reserved